Secure the network
- Last UpdatedFeb 18, 2025
- 1 minute read
A typical host computer will have some sort of network access. It is increasingly rare for an ICS device to run as an entirely standalone device. The host may use the network to communicate with other ICS components such as controllers, sensors, databases, remote clients, and even other hosts in peer-to-peer relationships. You may also use the network to manage several ICS devices from a development or supervisory computer.